咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 9 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 光学工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 信息与通信工程
    • 2 篇 轻工技术与工程
    • 2 篇 网络空间安全
    • 1 篇 冶金工程
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 生物工程
  • 4 篇 理学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 2 篇 feature selectio...
  • 1 篇 reverse influenc...
  • 1 篇 ddos attack
  • 1 篇 lstm
  • 1 篇 image segmentati...
  • 1 篇 full space
  • 1 篇 positive influen...
  • 1 篇 multi-layer perc...
  • 1 篇 convolution
  • 1 篇 vae
  • 1 篇 efficient reflec...
  • 1 篇 multi-functional...
  • 1 篇 information deca...
  • 1 篇 broadband transm...
  • 1 篇 generating adver...
  • 1 篇 graph convolutio...
  • 1 篇 hash functions
  • 1 篇 polar relation
  • 1 篇 recommendation s...
  • 1 篇 voting strategy

机构

  • 8 篇 heilongjiang key...
  • 7 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 1. school of com...
  • 2 篇 advanced microsc...
  • 2 篇 college of teach...
  • 2 篇 communication an...
  • 1 篇 innovation photo...
  • 1 篇 leme upl univ. p...
  • 1 篇 state key labora...
  • 1 篇 school of comput...
  • 1 篇 qiqihar universi...
  • 1 篇 key laboratory o...
  • 1 篇 institute for cr...
  • 1 篇 qiqihar universi...
  • 1 篇 school of mathem...
  • 1 篇 leme upl univers...
  • 1 篇 school of china ...
  • 1 篇 qiqihar universi...
  • 1 篇 key laboratory o...

作者

  • 3 篇 haizhen wang
  • 2 篇 zuozheng lian
  • 2 篇 zhang fengshan
  • 2 篇 shuangshuang yan...
  • 2 篇 pan haizhu
  • 2 篇 yu xiaomin
  • 2 篇 yang zixin
  • 2 篇 wenlong zhu
  • 2 篇 na jia
  • 2 篇 zhang guangda
  • 2 篇 yu miao
  • 2 篇 xi xiaotian
  • 2 篇 ge haimiao
  • 2 篇 li jingyou
  • 1 篇 chongyuan peng
  • 1 篇 yu xiaokun
  • 1 篇 谢文静
  • 1 篇 wang liguo
  • 1 篇 zhao yaxin
  • 1 篇 liu hongyan

语言

  • 12 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis"
14 条 记 录,以下是1-10 订阅
排序:
Optimizing Indoor network Element Layout for Enhanced Signal Coverage and security in Location-Based Services  7th
Optimizing Indoor Network Element Layout for Enhanced Signa...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Yu, Xiaomin Yu, Xiaokun College of Computer and Control Engineering Qiqihar University Qiqihar China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar China Heilongjiang Jiaotong Polytechnic Qiqihar China
Recently, with the rapid development of communication technology, location-based services (LBS) in indoor environments have penetrated into various aspects of people’s daily lives. Wireless local area networks (WLAN)... 详细信息
来源: 评论
MMEFU-Net: A Mamba-Guided Multi-Encoder Fusion U-Net for Tumor Segmentation in CT Images
收藏 引用
IEEE Access 2025年 13卷 76257-76270页
作者: Xue, Renzheng Zhang, Zifeng Liang, Minghui Zhao, Yaxin Zhang, Qing Qiqihar University School of Computer and Control Engineering 161000 China Qiqihar University Key Laboratory of Big Data Network Security Detection and Analysis Heilongjiang Province China Qiqihar Medical University School of Medical Technology 161000 China
Tumor segmentation is crucial for cancer diagnosis, treatment planning, and surgical interventions. However, traditional manual delineation methods are time-consuming, labor-intensive, and prone to subjective variabil... 详细信息
来源: 评论
Multi-channel transmission meta-holograms enabled by a single-layer complex-amplitude metasurface
收藏 引用
Optics Letters 2025年 第8期50卷 2542-2545页
作者: Zhu, Lei Wang, Yiya Dong, Liang Shang, Guanyu Burokur, Shah Nawaz Ding, Xumin School of Computer and Control Engineering Qiqihar University Qiqihar161006 China Communication and Electronics Engineering Institute Qiqihar University Qiqihar161006 China Key Laboratory of Big Data Network Security Detection and Analysis in Heilongjiang Qiqihar University Qiqihar161006 China Innovation Photonics and Imaging Center Instrumentation Science and Engineering Harbin Institute of Technology Harbin150001 China LEME UPL Univ. Paris Nanterre Ville d'AvrayF92410 France Advanced Microscopy and Instrumentation Research Center Harbin Institute of Technology Harbin150080 China
With an increasing demand for wireless communications, it is difficult for traditional communication technologies to achieve high-quality multi-channel wireless transmissions. Complex-amplitude metasurfaces provide an... 详细信息
来源: 评论
A novel quantum multiparty summation protocol based on a cooperative random number mechanism
收藏 引用
EPJ Quantum Technology 2025年 第1期12卷 1-19页
作者: Zhang, Kejia Zhang, Yu Zhang, Xue Liu, Hongyan Song, Tingting Du, Gang School of Computer Science and Big Data (School of Cybersecurity) Heilongjiang University Harbin China State Key Laboratory of Public Big Data Guizhou University Guiyang China School of Mathematical Science Heilongjiang University Harbin China Institute for Cryptology and Network Security Heilongjiang University Harbin China School of China Construction Bank University Northeastern Institute Harbin China College of Information Science and Technology Jinan University Guangzhou China
As a particular area of quantum security multiparty computation, quantum secure multiparty summation plays a critical role in modern cryptography. It is widely known that most of the existing quantum summation protoco...
来源: 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced data CVWGG
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Multi-scale hierarchical cross fusion network for hyperspectral image and LiDAR classification
收藏 引用
Journal of the Franklin Institute 2025年 第9期362卷
作者: Pan, Haizhu Li, Xuehu Ge, Haimiao Wang, Liguo Yu, Xiaomin College of Computer and Control Engineering Qiqihar University Qiqihar161000 China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar University Qiqihar161000 China College of Information and Communication Engineering Dalian Nationalities University Dalian116000 China
As the satellite sensor technology continues to advance, acquiring hyperspectral images (HSI) and Light detection and Ranging (LiDAR) data have become increasingly accessible. Consequently, the fusion of these two typ... 详细信息
来源: 评论
Maximizing Influence in Temporal Social networks:A Node Feature-Aware Voting Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第12期77卷 3095-3117页
作者: Wenlong Zhu Yu Miao Shuangshuang Yang Zuozheng Lian Lianhe Cui College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of ***,most existing stud... 详细信息
来源: 评论
A Positive Influence Maximization Algorithm in Signed Social networks
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1977-1994页
作者: Wenlong Zhu Yang Huang Shuangshuang Yang Yu Miao Chongyuan Peng College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
The influence maximization(IM)problem aims to find a set of seed nodes that maximizes the spread of their influence in a social *** positive influence maximization(PIM)problem is an extension of the IM problem,which c... 详细信息
来源: 评论